Archive for June, 2015

How to Develop and Maintain an IT Security Strategy

Share Button

“Does your organization have a fully mature security strategy?” In a recent Wisegate roundtable of vetted, information security leaders, 71 percent of participants claimed their organization did not have a mature security strategy. With security being a top business priority – especially in light of recent major security breaches – it’s…

Phishing, Fraud, and Breaches. What’s Next?

Share Button

In this day and age, one can never be over-prepared when it comes to Internet safety and cybersecurity. Many of us associate identity theft, fraud, and phishing as something that “won’t happen to me.” June is Internet Safety Month and we are excited to spread awareness against cybercrime and promote…

New Info Kit: How Are Your Peers Addressing Top Security Risks?

Share Button

It’s never been more important to have a lock-tight IT security program in place. Many of our members tell us that executive management is leaning heavily on their IT teams to implement programs that address security risks. To tackle this complicated priority, Wisegate hosted a survey to find how senior…